Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Keycloak - Identity and Access Management for Modern Applications
Keycloak - Identity and Access Management for Modern Applications

Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 protocols to secure applications

Arrow left icon
Profile Icon Stian Thorgersen Profile Icon Pedro Igor Silva
Arrow right icon
$54.99
Full star icon Full star icon Full star icon Full star icon Half star icon 4.5 (15 Ratings)
Paperback Jun 2021 362 pages 1st Edition
eBook
$29.99 $43.99
Paperback
$54.99
Subscription
Free Trial
Renews at $19.99p/m
Arrow left icon
Profile Icon Stian Thorgersen Profile Icon Pedro Igor Silva
Arrow right icon
$54.99
Full star icon Full star icon Full star icon Full star icon Half star icon 4.5 (15 Ratings)
Paperback Jun 2021 362 pages 1st Edition
eBook
$29.99 $43.99
Paperback
$54.99
Subscription
Free Trial
Renews at $19.99p/m
eBook
$29.99 $43.99
Paperback
$54.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
Table of content icon View table of contents Preview book icon Preview Book

Keycloak - Identity and Access Management for Modern Applications

Chapter 1: Getting Started with Keycloak

If you are new to Keycloak, this chapter will quickly get you up to speed. We'll start with a brief introduction to Keycloak. Then, you will find out how easy it is to install Keycloak and get it up and running. After we have started Keycloak, you will learn about the Keycloak admin console, which provides a great interface for managing and configuring Keycloak. Finally, we'll take a quick look at the Keycloak account console as well, which lets users of your applications manage their own accounts.

By the end of this chapter, you will know how to get started with the Keycloak server, and understand how you can use the Keycloak admin console to manage Keycloak. You will learn how to prepare Keycloak with an example user in order to get started securing your first application in the next chapter.

In this chapter, we're going to cover the following main topics:

  • Introducing Keycloak
  • Installing and running Keycloak
  • Discovering the Keycloak admin and account consoles

Technical requirements

For this chapter, in order to run Keycloak, you will need to have Docker (https://www.docker.com/) or JDK 8+ (https://openjdk.java.net/) installed on your workstation.

Check out the following link to see the Code in Action video:

https://bit.ly/3nRLgng

Introducing Keycloak

Keycloak is an open source Identity and Access Management tool with a focus on modern applications such as single-page applications, mobile applications, and REST APIs.

The project was started in 2014 with a strong focus on making it easier for developers to secure their applications. It has since grown into a well-established open source project with a strong community and user base. It is used in production for scenarios ranging from small websites with only a handful of users up to large enterprises with millions of users.

Keycloak provides fully customizable login pages, including strong authentication, as well as various flows, such as the recovery of passwords, requiring users to regularly update the passwords, accepting terms and conditions, and a lot more. All of this without any need to add anything to your applications, or any coding at all. All pages visible to your users support custom themes, making it very easy to modify the look and feel of the pages to integrate with your corporate branding and existing applications.

By delegating authentication to Keycloak, your applications do not need to worry about different authentication mechanisms, or how to safely store passwords. This approach also provides a higher level of security as applications do not have direct access to user credentials; they are instead provided with security tokens that give them only access to what they need.

Keycloak provides single sign-on as well as session management capabilities, allowing users to access multiple applications, while only having to authenticate once. Both users themselves and administrators have full visibility to where users are authenticated, and can remotely terminate sessions when required.

Keycloak builds on industry standard protocols supporting OAuth 2.0, OpenID Connect, and SAML 2.0. Using industry standard protocols is important from both a security perspective and in terms of making it easier to integrate with existing and new applications.

Keycloak comes with its own user database, which makes it very easy to get started. You can also easily integrate with existing identity infrastructure. Through its identity brokering capabilities, you can plug in existing user bases from social networks, or other enterprise identity providers. It can also integrate with existing user directories, such as Active Directory and LDAP servers.

Keycloak is a lightweight and easy-to-install solution. It is highly scalable and provides high availability through clustering capabilities. For additional redundancy, Keycloak also supports clustering to multiple data centers.

A lot of effort has gone into making Keycloak usable out of the box, supporting common use cases, but, at the same time, it is highly customizable and extendable when needed. Keycloak has a large number of extension points where you can implement and deploy custom code to Keycloak to modify existing behavior or add completely new capabilities. Examples of extensions that can be written to Keycloak include custom authentication mechanisms, integrations with custom user stores, and the custom manipulation of tokens. You can even implement your own custom login protocols.

This section was a very brief introduction to the features and capabilities of Keycloak. As this book aims to give you a practical guide to Keycloak, we will come back to many of these features in later chapters, where you will learn firsthand how you can put these to use.

Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Get up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examples
  • Configure, manage, and extend Keycloak for optimized security
  • Leverage Keycloak features to secure different application types

Description

Implementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications, which can make a world of difference if you learn how to use it. Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you'll gain insights into securely using Keycloak in production. By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications.

Who is this book for?

Developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected.

What you will learn

  • Understand how to install, configure, and manage Keycloak
  • Secure your new and existing applications with Keycloak
  • Gain a basic understanding of OAuth 2.0 and OpenID Connect
  • Understand how to configure Keycloak to make it ready for production use
  • Discover how to leverage additional features and how to customize Keycloak to fit your needs
  • Get to grips with securing Keycloak servers and protecting applications
Estimated delivery fee Deliver to United States

Economy delivery 10 - 13 business days

Free $6.95

Premium delivery 6 - 9 business days

$21.95
(Includes tracking information)

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jun 11, 2021
Length: 362 pages
Edition : 1st
Language : English
ISBN-13 : 9781800562493
Vendor :
Red Hat
Tools :

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
Estimated delivery fee Deliver to United States

Economy delivery 10 - 13 business days

Free $6.95

Premium delivery 6 - 9 business days

$21.95
(Includes tracking information)

Product Details

Publication date : Jun 11, 2021
Length: 362 pages
Edition : 1st
Language : English
ISBN-13 : 9781800562493
Vendor :
Red Hat
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 153.97
Mastering Ansible, 4th Edition
$43.99
Modern DevOps Practices
$54.99
Keycloak - Identity and Access Management for Modern Applications
$54.99
Total $ 153.97 Stars icon

Table of Contents

20 Chapters
Section 1: Getting Started with Keycloak Chevron down icon Chevron up icon
Chapter 1: Getting Started with Keycloak Chevron down icon Chevron up icon
Chapter 2: Securing Your First Application Chevron down icon Chevron up icon
Section 2: Securing Applications with Keycloak Chevron down icon Chevron up icon
Chapter 3: Brief Introduction to Standards Chevron down icon Chevron up icon
Chapter 4: Authenticating Users with OpenID Connect Chevron down icon Chevron up icon
Chapter 5: Authorizing Access with OAuth 2.0 Chevron down icon Chevron up icon
Chapter 6: Securing Different Application Types Chevron down icon Chevron up icon
Chapter 7: Integrating Applications with Keycloak Chevron down icon Chevron up icon
Chapter 8: Authorization Strategies Chevron down icon Chevron up icon
Section 3: Configuring and Managing Keycloak Chevron down icon Chevron up icon
Chapter 9: Configuring Keycloak for Production Chevron down icon Chevron up icon
Chapter 10: Managing Users Chevron down icon Chevron up icon
Chapter 11: Authenticating Users Chevron down icon Chevron up icon
Chapter 12: Managing Tokens and Sessions Chevron down icon Chevron up icon
Chapter 13: Extending Keycloak Chevron down icon Chevron up icon
Section 4: Security Considerations Chevron down icon Chevron up icon
Chapter 14: Securing Keycloak and Applications Chevron down icon Chevron up icon
Assessments Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.5
(15 Ratings)
5 star 80%
4 star 6.7%
3 star 0%
2 star 6.7%
1 star 6.7%
Filter icon Filter
Top Reviews

Filter reviews by




Mr Philip Hayes Jun 24, 2021
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Excellent introduction to the world of SSO and keycloak.
Amazon Verified review Amazon
Amazon Customer Nov 03, 2021
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Ich habe dieses Buch gekauft, da wir Keycloak als IP einsetzen wollen.Dies Buch vermittelt sowohl Grundlagen von OAuth & Co als auch von Keycloak.Ich kann dieses Buch nur jedem empfehlen, der sich mit diesem Thema auseinander setzen will bzw. muss.Für mich als Softwareentwickler war es eine echte Arbeitserleichterung.
Amazon Verified review Amazon
Donald E Lutz Jul 28, 2021
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This is an excellent overview of access and identity management. It describes all the standards of OAuth and OIDC and how it works in Keycloak. It helps one understand how to integrate identity in whatever cloud platform. The patterns help address it in a very cloud native method.The book further addresses authorization which has elements of art more than engineering. It covers RBAC, GBAC, and ABAC well but it could use more coverage and details to understand how to define the authorization method used.This is an excellent addition to one's technical library.
Amazon Verified review Amazon
Bruce P. Jun 16, 2021
Full star icon Full star icon Full star icon Full star icon Full star icon 5
The version of the book I purchased today renders as gray text on black background when set to render white on black, using Kindle for Android. I'll contact the publisher and I hope they fix it. I'm one of those people who often read books in the dark, white-on-black so I don't disturb my partner.
Amazon Verified review Amazon
MJSzemak Aug 29, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Keycloak – Identity and Access Management for Modern Applications by Stian Thorgersen and Pedro Igor Silva, is a great book that covers the IAM tool. It is tailored for modern applications like single-page and mobile apps, and APIs. This is a tool that I have been looking forward to learning more in-depth about, and this book is a great resource. Chapters 2 and 3 were ones I found very informative. Chapter 2 of the book, titled "Securing Your First Application," explains the process of securing an application using Keycloak. This is demonstrated through a sample application with a single page and REST API. Chapter 3, titled "Brief Introduction to Standards," provides a concise overview and comparison of the standards supported by Keycloak. This helps readers understand how Keycloak facilitates the secure integration of their applications with ease
Amazon Verified review Amazon